Home / malware PWS:Win32/Dexter.A
First posted on 12 September 2013.
Source: MicrosoftAliases :
There are no other names known for PWS:Win32/Dexter.A.
Explanation :
Threat behavior PWS:Win32/Dexter.A is a trojan that is specifically used to capture personal information, such as user names and passwords, and then send that information to a remote attacker.
Installation
When it runs, PWS:Win32/Dexter.A copies itself to c:\documents and settings\administrator\application data\uamxd\uamxd.exe. The malware modifies the following registry entry so that it runs each time you start your PC:
Adds value: "77bf0eb2-5959-4454-a6f7-23876103b968"
With data: "c:\documents and settings\administrator\application data\uamxd\uamxd.exe"
To subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run The malware creates the following files on your computer:
The malware utilizes code injection to hinder detection and removal. When PWS:Win32/Dexter.A runs, it may inject code into running processes, including the following:
- %windir%\assembly\nativeimages_v4.0.30319_32\temp\ae0-0\system.data.datasetextensions.dll
- IEXPLORE.EXE
Payload
Contacts remote host
PWS:Win32/Dexter.A may contact a remote host at 91.229.76.97 using port 80. Commonly, malware may contact a remote host for the following purposes:
- To report a new infection to its author
- To receive configuration or other data
- To download and execute arbitrary files (including updates or additional malware)
- To receive instruction from a remote attacker
- To upload data taken from the affected computer
This malware description was produced and published using our automated analysis system's examination of file SHA1 199a9614027684913b820f3828c75c6c47476f1e.Symptoms
System changes
The following system changes may indicate the presence of this malware:
%windir%\assembly\nativeimages_v4.0.30319_32\temp\ae0-0\system.data.datasetextensions.dll
- The presence of the following files:
c:\documents and settings\administrator\application data\uamxd\uamxd.exeAdds value: "77bf0eb2-5959-4454-a6f7-23876103b968"
- The presence of the following registry modifications:
With data: "c:\documents and settings\administrator\application data\uamxd\uamxd.exe"
To subkey: HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\RunLast update 12 September 2013